MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3ee73c44fb49972ab6a7a00de73358d44f2fc94ce90dc2fffe8dcfbb00289bed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | 3ee73c44fb49972ab6a7a00de73358d44f2fc94ce90dc2fffe8dcfbb00289bed |
|---|---|
| SHA3-384 hash: | 750a30a89145f9353592d17d8453a314014462f7c7bcf143e9b85d5c4bf2633cb13bfee73e4a2606b5c8687bff65b75b |
| SHA1 hash: | a73020b0948dce801d2a9989b3f5b11505022a7d |
| MD5 hash: | 00b84b3afbc4233597a88c24cdd8a151 |
| humanhash: | pennsylvania-two-eighteen-happy |
| File name: | Nova narudzba je u prilogu.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'051'136 bytes |
| First seen: | 2022-08-31 05:48:55 UTC |
| Last seen: | 2022-08-31 08:46:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 45e97a00ecbd587477169510db95872b (5 x RemcosRAT, 3 x ModiLoader, 2 x FormBook) |
| ssdeep | 24576:DJLADyaLg23PYHKiMtkku4nzSrmdN40JIyE9WDvk:DJEDfg23w4tkku4nzSrmdmWbaW |
| TLSH | T1C325C0E2B3E49733D5A31678CE1B5368986AFE201E24588A7BF51D4CDF34690383D297 |
| TrID | 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.2% (.EXE) InstallShield setup (43053/19/16) 1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.2% (.SCR) Windows screen saver (13101/52/3) |
| File icon (PE): | |
| dhash icon | eef2eed69696eabe (10 x RemcosRAT, 8 x ModiLoader, 6 x Formbook) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
243
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Nova narudzba je u prilogu.exe
Verdict:
Malicious activity
Analysis date:
2022-08-30 13:47:04 UTC
Tags:
installer formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a process with a hidden window
Searching for synchronization primitives
Launching cmd.exe command interpreter
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
greyware keylogger overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-08-30 12:56:30 UTC
File Type:
PE (Exe)
Extracted files:
91
AV detection:
20 of 26 (76.92%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
xloader
Score:
10/10
Tags:
family:modiloader family:xloader campaign:euv4 loader persistence rat trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
ModiLoader Second Stage
Xloader payload
ModiLoader, DBatLoader
Xloader
Unpacked files
SH256 hash:
dd98aba7a667aa34e7883503f23b3f8efff8b4b56e22f753a72b37c14a3127b3
MD5 hash:
dfd91793d4bb73bb475e0acecf94c9f7
SHA1 hash:
f5ec6cb9eeae23da65a478b614b9b74370878670
Detections:
win_dbatloader_g1
Parent samples :
8dfdca6776aa1a394f74bd25cd324ec788db0a4e9becabbd0708a36293e0b489
f2e738e7d41e2a56d233352763c8940eff51372fd6ef514d439eb6ca131634ce
8945a72bfeac4f8234fa7eb586fa51f0cab91a0a48fdc65120947dfe37fb9970
bd80461f8ced83b6ef02cc5e7c678418da890aed3941b48d42da4c1cab3ce39c
b6a9878c4d5b3dd36d0052ec143bbb6ddc5437e9566a23d32643a9ee0ce9237f
e26db42b6bdac38eb5bd4f6cd710e44b47e7ac013f0aa3803d62a939ae4aa5c0
f47a579ec7384b201fda64a499f13217c1be1c137a679cc16d57dc7fc455c4cc
7d41c471d4c5893ee0dd1c50cb44d7215e6b9cb5a693a587a0d33d894dea13d7
42947e97ad35ffa876ac2b7f6b55f5af0c053a4bca000527a0facee77e6fc1d4
d446f3c94c08272b51766faa63a5c716827d37040d9222819519c5124735a4be
5fb66e071cc768212f33d7252c094e9b57bfba2942836a28a550e7fb02c9b800
dbc1b999e36f9367bc87eb6f04929a7c2518c390a19d8f51d4ae3ebac9dea9c8
448cfa4716572ead5e09c63dc97479e1a786d63ce536400cac310938493fe236
3ee73c44fb49972ab6a7a00de73358d44f2fc94ce90dc2fffe8dcfbb00289bed
a68afdaf21870e0747dfa4c46670577d0e21b545e8b0225568f2a84819666117
f2e738e7d41e2a56d233352763c8940eff51372fd6ef514d439eb6ca131634ce
8945a72bfeac4f8234fa7eb586fa51f0cab91a0a48fdc65120947dfe37fb9970
bd80461f8ced83b6ef02cc5e7c678418da890aed3941b48d42da4c1cab3ce39c
b6a9878c4d5b3dd36d0052ec143bbb6ddc5437e9566a23d32643a9ee0ce9237f
e26db42b6bdac38eb5bd4f6cd710e44b47e7ac013f0aa3803d62a939ae4aa5c0
f47a579ec7384b201fda64a499f13217c1be1c137a679cc16d57dc7fc455c4cc
7d41c471d4c5893ee0dd1c50cb44d7215e6b9cb5a693a587a0d33d894dea13d7
42947e97ad35ffa876ac2b7f6b55f5af0c053a4bca000527a0facee77e6fc1d4
d446f3c94c08272b51766faa63a5c716827d37040d9222819519c5124735a4be
5fb66e071cc768212f33d7252c094e9b57bfba2942836a28a550e7fb02c9b800
dbc1b999e36f9367bc87eb6f04929a7c2518c390a19d8f51d4ae3ebac9dea9c8
448cfa4716572ead5e09c63dc97479e1a786d63ce536400cac310938493fe236
3ee73c44fb49972ab6a7a00de73358d44f2fc94ce90dc2fffe8dcfbb00289bed
a68afdaf21870e0747dfa4c46670577d0e21b545e8b0225568f2a84819666117
SH256 hash:
3ee73c44fb49972ab6a7a00de73358d44f2fc94ce90dc2fffe8dcfbb00289bed
MD5 hash:
00b84b3afbc4233597a88c24cdd8a151
SHA1 hash:
a73020b0948dce801d2a9989b3f5b11505022a7d
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.